6.1
CVE-2026-20104
- EPSS 0.05%
- Veröffentlicht 25.03.2026 16:16:14
- Zuletzt bearbeitet 26.03.2026 15:13:15
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
A vulnerability in the bootloader of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches, Cisco Catalyst ESS9300 Embedded Series Switches, Cisco Catalyst IE9310 and IE9320 Rugged Series Switches, and Cisco IE3500 and IE3505 Rugged Series Switches could allow an authenticated, local attacker with level-15 privileges or an unauthenticated attacker with physical access to an affected device to execute arbitrary code at boot time and break the chain of trust. This vulnerability is due to insufficient validation of software at boot time. An attacker could exploit this vulnerability by manipulating the loaded binaries on an affected device to bypass some of the integrity checks that are performed during the boot process. A successful exploit could allow the attacker to execute code that bypasses the requirement to run Cisco-signed images. Cisco has assigned this security advisory a Security Impact Rating (SIR) of High rather than Medium as the score indicates because this vulnerability allows an attacker to bypass a major security feature of a device.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
≫
Produkt
Cisco IOS XE Software
Version
16.12.8
Status
affected
Version
16.12.6
Status
affected
Version
16.12.6a
Status
affected
Version
16.12.7
Status
affected
Version
17.3.3
Status
affected
Version
17.3.4
Status
affected
Version
17.3.5
Status
affected
Version
17.3.6
Status
affected
Version
17.3.4b
Status
affected
Version
17.3.7
Status
affected
Version
17.3.8
Status
affected
Version
17.3.8a
Status
affected
Version
17.4.1
Status
affected
Version
17.5.1
Status
affected
Version
17.6.1
Status
affected
Version
17.6.2
Status
affected
Version
17.6.3
Status
affected
Version
17.6.1y
Status
affected
Version
17.6.4
Status
affected
Version
17.6.5
Status
affected
Version
17.6.6
Status
affected
Version
17.6.6a
Status
affected
Version
17.6.5a
Status
affected
Version
17.6.7
Status
affected
Version
17.6.8
Status
affected
Version
17.7.1
Status
affected
Version
17.7.1a
Status
affected
Version
17.10.1
Status
affected
Version
17.8.1
Status
affected
Version
17.8.1a
Status
affected
Version
17.9.1
Status
affected
Version
17.9.2
Status
affected
Version
17.9.1a
Status
affected
Version
17.9.3
Status
affected
Version
17.9.4
Status
affected
Version
17.9.5
Status
affected
Version
17.9.4a
Status
affected
Version
17.9.5b
Status
affected
Version
17.9.6
Status
affected
Version
17.9.6a
Status
affected
Version
17.9.7
Status
affected
Version
17.9.8
Status
affected
Version
17.11.1
Status
affected
Version
17.12.1
Status
affected
Version
17.12.2
Status
affected
Version
17.12.3
Status
affected
Version
17.12.4
Status
affected
Version
17.12.5
Status
affected
Version
17.12.6
Status
affected
Version
17.13.1
Status
affected
Version
17.14.1
Status
affected
Version
17.15.1
Status
affected
Version
17.15.2
Status
affected
Version
17.15.3
Status
affected
Version
17.15.4
Status
affected
Version
17.16.1
Status
affected
Version
17.17.1
Status
affected
Version
17.18.1
Status
affected
Version
17.18.2
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.159 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@cisco.com | 6.1 | 0.9 | 5.2 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
CWE-124 Buffer Underwrite ('Buffer Underflow')
The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the buffer.